Critical severityNVD Advisory· Published Mar 12, 2026· Updated Mar 13, 2026
Locutus: RCE via unsanitized input in create_function()
CVE-2026-32304
Description
Locutus brings stdlibs of other programming languages to JavaScript for educational purposes. Prior to 3.0.14, the create_function(args, code) function passes both parameters directly to the Function constructor without any sanitization, allowing arbitrary code execution. This is distinct from CVE-2026-29091 which was call_user_func_array using eval() in v2.x. This finding affects create_function using new Function() in v3.x. This vulnerability is fixed in 3.0.14.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
locutusnpm | < 3.0.14 | 3.0.14 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-vh9h-29pq-r5m8ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-32304ghsaADVISORY
- github.com/locutusjs/locutus/releases/tag/v3.0.14ghsax_refsource_MISCWEB
- github.com/locutusjs/locutus/security/advisories/GHSA-vh9h-29pq-r5m8ghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.